Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
Risk-based access control raises some novel problems that have not yet been investigated. In particular, the ability to aggregate uncertain risk estimations from different experts...
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
The extensible markup language (XML) is a standard for describing information on the Internet and is quickly becoming the most preferred way to store and exchange information. The...
An approach to exible hyperbase hypertext database support predicated on the notion of extensibility is presented. The extensible hypertext platform Hyperform implements basic hyp...